0% found this document useful (0 votes)
7 views

DLP-Cloud Computing

DLP of Cloud Computing V SEm CSE
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

DLP-Cloud Computing

DLP of Cloud Computing V SEm CSE
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Unit-1 1 Introduction

Unit-2 Cloud Enabling Technologies


Unit-3 Cloud Architecture Services and Storage
Unit-4 Resource Management and Security Cloud

Unit-5 Cloud Technologies and Advancements


CS8791 - CLOUD COMPUTING
1.1 Introduction to Cloud Computing

1.2 Evolution of Cloud Computing

1.3 Principles of Parallel and Distributed Computing

1.4 Cloud Characteristics

2.1 Service Oriented Architecture


2.2 REST and Systems of Systems
2.3 Web Services
2.4 Basics of Virtualization

2.5 Types of Virtualization

2.6 Implementation Levels of Virtualization

2.7 Virtualization Structures, Tools and Mechanisms

2.8 Virtualization of CPU, Memory and I/O Devices


2.9 Virtualization Support and Disaster Recovery

3.1 Layered Cloud Architecture Design


3.2 NIST Cloud Computing Reference Architecture
3.3 Cloud Deployment Model

3.4 Cloud Service Model

3.5 Architectural Design Challenges

3.6 Cloud Storage


4.1 Inter Cloud Resource Management

4.2 Resource Provisioning


4.3 Resource Provisioning Methods

4.4 Global Exchange of Cloud Resources


4.5 Security Overview
4.6 Cloud Security Challenges
4.7 Software-as-a-Service Security
4.8 Security Governance
4.9 Virtual Machine Security
4.10 IAM
4.11 Security Standards

5.1 Hadoop
5.2 MapReduce
5.3 Virtual Box
Revision
5.4 Google App Engine

5.5 Programming Environment for Google App Engine


5.6 OpenStack
5.7 Federation in the Cloud
5.8 Four Levels of Federation

5.9 Federated Services and Applications


5.10 Future of Federation
CS8791 - CLOUD COMPUTING
15 1
1.1.1 Definition of cloud and Neat diagram 10
1.1.2 Cloud Components 10
5
1.2.1 Hardware Evolution 5 2
1.2.1.1 First Generation Computer 7
1.2.1.2 Second Generation Computers 7
1.2.1.3 Third Generation Computers 7
1.2.1.4 Fourth Generation Computers 7
1.2.2 Internet Software Evolution 7
1.2.2.1 Server Virtualization 5 3
Revision 10
5
1.3.1 Parallel vs distributed computing 5
1.3.2 Elements of parallel computing 5
1.3.3 Elements of distributed computing 5
1.3.4 Models for inter process communication 5
1.3.5 Models for message-based communication 5 4
Revision 5
1.3.5.1 Point-to-point message model 5
1.3.5.2 Publish-and-subscribe message model 5
1.3.5.3 Request-reply message model 5
1.3.6 Technologies for distributed computing 5
1.3.6.1 Remote procedure call 5
1.3.6.2 Distributed object frameworks 5
1.3.6.3 Service-oriented computing 5 5
Revision 10
5
1.4.1 On-demand Provisioning 5
1.4.2 Universal Access 5
1.4.3 Enhanced Reliability 5
1.4.4 Measured Services 5
1.4.5 Multitenancy 5 6
1.4.6 Resource pooling 5
1.4.7 Rapid elasticity and Scalability 5
1.4.8 Easy Maintenance 5
1.4.9 High Availability 5
1.4.10 On-demand Provisioning 5
Revision 15
Unit-I Test 40 7
5 8
10
5
5
5
2.4.1 Characteristics of virtualized environments 5
2.5.1 Hardware level virtualization 5
2.5.1.1 Hardware virtualization techniques 7 9
2.5.1.2 Hardware assisted virtualization 7
2.5.1.3 Full virtualization 7
2.5.1.4 Paravirtualization 7
2.5.1.5 Partial virtualization 7
2.5.2 Operating system level virtualization 5
2.5.3 Programming language-level virtualization 5 10
2.5.4 Application level virtualization 5
2.6.1 Other types of virtualization 5
2.6.1.1 Storage virtualization 5
2.6.1.1 Network virtualization 5
2.6.1.1 Desktop virtualization 5
2.6.1.1 Application server virtualization 5
Revision 5
Class Test 40 11
5 12
2.6.1 Levels of virtualization implementation 4
2.6.2 Instruction set architecture level 6
2.6.3 Hardware abstraction level 5
2.6.4 Operating system level 5
2.6.5 Library support level 5
2.6.6 User application level 5
2.6.7 Relative merits of different approaches 5
Revision 10 13
5
2.7.1 Hypervisor and Xen architecture 5
2.7.2 Xen architecture 5
2.7.3 Binary translation with full virtualization 6
4
2.8.1 Hardware support for virtualization 5 14
2.8.2 CPU virtualization 5
2.8.2.1 Hardware-assisted CPU virtualization 7
2.8.3 Memory virtualization 7
2.8.4 I/O virtualization 7
2.8.4.1 Virtualization in multi-core processors 7
2.8.4.2 Physical versus virtual processor cores 7
2.8.4.3 Virtual hierarchy 5
Revision 10 15
4
2.9.1 Hardware Virtualization 5
2.9.2 Virtualization Support in Public Clouds 6
2.9.3 Virtualization for IaaS 5
2.9.4 VM Cloning for Disaster Recovery 5
Revision 5
Unit -II Test 40 16
5 17
10
10
5
3.3.1 Public Cloud 5
3.3.1.1 Benefits of choosing a Public Cloud 5
3.3.1.2 Disadvantages of choosing a Public Cloud 5 18
3.3.2 Private Cloud 5
3.3.2.1 Benefits of choosing a Private Cloud 5
3.3.2.2 Disadvantages of choosing a Private Cloud 5
3.3.3 Community Cloud 5
3.3.3.1 Benefits of Choosing a Community Cloud 5
3.3.3.2 Disadvantages of Choosing a Community Cloud 5
3.3.4 Hybrid Cloud 5
Revision 10 19
5
3.4.1 laaS 5
3.4.2 PaaS 5
3.4.3 SaaS 5
Revision 5
5
3.5.1 Challenge 1: Service Availability and Data Lock-in Problem 7 20
3.5.2 Challenge 2: Data Privacy and Security Concerns 7
3.5.3 Challenge 3: Unpredictable Performance and Bottlenecks 7
3.5.4 Challenge 4: Distributed Storage and Widespread Software Bugs 7
3.5.5 Challenge 5: Cloud Scalability, Interoperability, and Standardization 7
3.5.6 Challenge 6: Software Licensing and Reputation Sharing 5
Revision 40 21
Class Test 40 22
5 23
3.6.1 Storage-as-a-Service 5
3.6.2 Advantages of Cloud Storage 5
3.6.3 Cloud Storage Providers 5
3.6.4 S3 5
Revision 15
Unit III Test 40 24
4 25
6
4.1.1 Inter Cloud Resource Management 10
5
4
4.3.1 Demand-Driven Resource Provisioning 6
4.3.2 Event-Driven Resource Provisioning 5
4.3.3 Popularity-Driven Resource Provisioning 6 26
Revision 4
6
10
10
4
6 27
4
6
6
4.11.1 Security Assertion Markup Language (SAML) 6
4.11.2 Open Authentication (OAuth) 6
4.11.3 OpenID 6
Revision 40 28
Class Test 40 29
Unit-IV Test 40 30
7 31
7
7
7
5
7
5.4.1 GAE Architecture 10 32
5.4.2 Functional Modules of GAE 10
5.4.3 GAE Applications 10
6
4
7 33
7
5.8.1 Permissive federation 7
5.8.2 Verified federation 7
5.8.3 Encrypted federation 7
5.8.4 Trusted federation 5
7 34
7

You might also like